Efficient Unique Ring Signatures from Lattices

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 2
1. Verfasser: Nguyen, Tuong Ngoc (VerfasserIn)
Weitere Verfasser: Ta, Anh The (VerfasserIn), Le, Huy Quoc (VerfasserIn), Duong, Dung Hoang (VerfasserIn), Susilo, Willy (VerfasserIn), Guo, Fuchun (VerfasserIn), Fukushima, Kazuhide (VerfasserIn), Kiyomoto, Shinsaku (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Anonymous Traceback for End-to-End Encryption 2022 Kenney, Erin
Verifying the Quality of Outsourced Training on Clouds 2022 Li, Peiyang
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption 2022 Wang, Xingkai
Robust and Scalable Process Isolation Against Spectre in the Cloud 2022 Schwarzl, Martin
SecQuant: Quantifying Container System Call Exposure 2022 Jang, Sunwoo
On Committing Authenticated-Encryption 2022 Chan, John
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key 2022 Jiang, Jingwei
Continuous Authentication in Secure Messaging 2022 Dowling, Benjamin
Half-Aggregation of Schnorr Signatures with Tight Reductions 2022 Chen, Yanbo
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps 2022 Ahmad, Javaria
No-Label User-Level Membership Inference for ASR Model Auditing 2022 Miao, Yuantian
A Framework for Constructing Single Secret Leader Election from MPC 2022 Backes, Michael
AppBastion: Protection from Untrusted Apps and OSes on ARM 2022 Suciu, Darius
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost 2022 Susilo, Willy
Utility-Preserving Biometric Information Anonymization 2022 Moriarty, Bill
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay 2022 Zheng, Yubo
Real-Time Policy Enforcement with Metric First-Order Temporal Logic 2022 Hublet, François
Sequential Digital Signatures for Cryptographic Software-Update Authentication 2022 Poettering, Bertram
Deterministic Wallets for Adaptor Signatures 2022 Erwig, Andreas
IoTEnsemble: Detection of Botnet Attacks on Internet of Things 2022 Li, Ruoyu
Alle Artikel auflisten